ABSTRACT

Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-ba

The Case for De-Identifying Personal Health Information. Permitted Disclosures, Consent, and De-identification of PHI. Permitted Uses and Disclosures of Health Information. The Impact of Consent. Data Breach Notifications. Peeping and Snooping. Unplanned but Legitimate Uses and Disclosures. Public Perception and Privacy Protective Behaviors. Alternative Methods for Data Access. Understanding Disclosure Risks. Scope, Terminology, and Definitions. Frequently Asked Questions about De-identification. A Methodology for Managing Re-identification Risk. Definitions of Identifiability. Data Masking Methods. Theoretical Re-identification Attacks. Measuring Re-Identification Risk. Measuring the Probability of Re-identification. Measures of Uniqueness. Modeling the Threat. Choosing Metric Thresholds. Practical Methods for De-Identification. De-identification Methods. Practical Tips. End Matter. An Analysis of Historical Breach Notification Trends. Methods of Attack for Maximum Journalist Risk. How Many Friends Do We Have? Cell Size Precedents. The Invasion of Privacy Construct. General Information on Mitigating Controls. Assessing Motives and Capacity. Invasion of Privacy.